Problem

The following is a list of six control plans from this chapter. Control Plans A....

The following is a list of six control plans from this chapter.

Control Plans

A. Service level agreements

B. Library controls

C. Security guards

D. User manuals

E. Biometric identification systems

F. Program change controls

The following is a list of five situations that have control implications.

Control Situations

1. Henry and Edward have been friends for many years. Henry works in the shipping department at Superior Company, an electronics wholesaler, and Edward is unemployed. To make a little money, Edward “borrowed” Henry’s employee badge (it has a magnetic strip on the back to open doors at Superior Company), and used the badge to access the Superior warehouse and steal some electronics gear.

2. At Capstone Company, most transaction processing is automated. When an inventory item reaches its reorder point, the computer automatically prints a purchase order for the economic order quantity (EOQ). A programmer, who was in collusion with CubicArm, Inc., the vendor that supplied several parts, altered the computer program and the inventory master data for those parts. He reduced the EOQ and made certain program alterations, so that items supplied by CubicArm were ordered more often than Capstone required them.

3. The customer service representatives at Gamma Supplies, a catalog sales company, have been complaining that the computer system response time is very slow. They find themselves apologizing to customers who are waiting on the phone for their orders to be completed.

4. The data entry clerk in the accounts payable department at Lloyd Company did not have detailed instructions for completing the input form for approved vendor invoices. To speed up data entry, he let all of the date information default from the current day’s date. As a result, several invoices were paid late, and Lloyd Company lost cash discounts on several other vendor payments.

5. During a normal workday, Bill, who was not an employee, entered Rowley Company’s offices and was able to find and remove some computer printouts containing user IDs and other sensitive information. He later used that information to gain access to Rowley’s computer system.

Match the five situations with a control plan that would best prevent the system failure from occurring. Because there are six control plans, you should have one letter left over.

Step-by-Step Solution

Request Professional Solution

Request Solution!

We need at least 10 more requests to produce the solution.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the solution will be notified once they are available.
Add your Solution
Textbook Solutions and Answers Search